With the development of the information technology ,information security ,as well as the implementation ofthe encryption system becomes more and more complexity,and therefore new methods are explored to simplify com-p...With the development of the information technology ,information security ,as well as the implementation ofthe encryption system becomes more and more complexity,and therefore new methods are explored to simplify com-plexity of the implementation. Cellular automata has the characters of simplicity of basic components ,locality of cellu-lar automata interactions ,massive parallelism of information processing ,and exhibits complex global properties, whichmakes it suitable for the application in cryptography. This paper presents a new method of encryption,the key of thenew method consists of the permutation cellular automata, the vectors inputted, and the number of the itera-tion. Evidently,it has larger kev space than other methods with only the cellular automata itself as the key.展开更多
Representation theory is concerned with the ways of explaining or visualizing a group as a group of matrices. In this paper, we extend the permutation pattern of to a two-line notation. We consider the representations...Representation theory is concerned with the ways of explaining or visualizing a group as a group of matrices. In this paper, we extend the permutation pattern of to a two-line notation. We consider the representations of this non-deranged permutation group(p ≥ 5 and p a prime). Also we reveal some interesting properties and results of the character of where .展开更多
The automorphism group of a flag-transitive 6–(v, k, 2) design is a 3-homogeneous permutation group. Therefore, using the classification theorem of 3–homogeneous permutation groups, the classification of flag-transi...The automorphism group of a flag-transitive 6–(v, k, 2) design is a 3-homogeneous permutation group. Therefore, using the classification theorem of 3–homogeneous permutation groups, the classification of flag-transitive 6-(v, k,2) designs can be discussed. In this paper, by analyzing the combination quantity relation of 6–(v, k, 2) design and the characteristics of 3-homogeneous permutation groups, it is proved that: there are no 6–(v, k, 2) designs D admitting a flag transitive group G ≤ Aut (D) of automorphisms.展开更多
The application of χ state are investigated in remote state preparation (RSP). By constructing useful measurement bases with the aid of Hurwitz matrix equation, we propose several RSP schemes of arbitrary two- and ...The application of χ state are investigated in remote state preparation (RSP). By constructing useful measurement bases with the aid of Hurwitz matrix equation, we propose several RSP schemes of arbitrary two- and three-qubit states via the χ state as the entangled resource. It is shown that the original state can be successfully prepared with the probability 100% and 50% for real coefficients and complex coefficients, respectively. For the latter case, the special ensembles with unit success probability are discussed by the permutation group. It is worth mentioning that the novel measurement bases have no restrictions on the coefficients of the prepared state, which means that the proposed schemes are more applicable.展开更多
文摘With the development of the information technology ,information security ,as well as the implementation ofthe encryption system becomes more and more complexity,and therefore new methods are explored to simplify com-plexity of the implementation. Cellular automata has the characters of simplicity of basic components ,locality of cellu-lar automata interactions ,massive parallelism of information processing ,and exhibits complex global properties, whichmakes it suitable for the application in cryptography. This paper presents a new method of encryption,the key of thenew method consists of the permutation cellular automata, the vectors inputted, and the number of the itera-tion. Evidently,it has larger kev space than other methods with only the cellular automata itself as the key.
文摘Representation theory is concerned with the ways of explaining or visualizing a group as a group of matrices. In this paper, we extend the permutation pattern of to a two-line notation. We consider the representations of this non-deranged permutation group(p ≥ 5 and p a prime). Also we reveal some interesting properties and results of the character of where .
文摘The automorphism group of a flag-transitive 6–(v, k, 2) design is a 3-homogeneous permutation group. Therefore, using the classification theorem of 3–homogeneous permutation groups, the classification of flag-transitive 6-(v, k,2) designs can be discussed. In this paper, by analyzing the combination quantity relation of 6–(v, k, 2) design and the characteristics of 3-homogeneous permutation groups, it is proved that: there are no 6–(v, k, 2) designs D admitting a flag transitive group G ≤ Aut (D) of automorphisms.
基金supported by the National Natural Science Foundation of China(Grant Nos.61201253 and 61303039)the Fundamental Research Funds for the Central Universities of China(Grant No.2682014CX095)
文摘The application of χ state are investigated in remote state preparation (RSP). By constructing useful measurement bases with the aid of Hurwitz matrix equation, we propose several RSP schemes of arbitrary two- and three-qubit states via the χ state as the entangled resource. It is shown that the original state can be successfully prepared with the probability 100% and 50% for real coefficients and complex coefficients, respectively. For the latter case, the special ensembles with unit success probability are discussed by the permutation group. It is worth mentioning that the novel measurement bases have no restrictions on the coefficients of the prepared state, which means that the proposed schemes are more applicable.